首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   74283篇
  免费   9733篇
  国内免费   4575篇
电工技术   6413篇
技术理论   6篇
综合类   5944篇
化学工业   10286篇
金属工艺   4355篇
机械仪表   5254篇
建筑科学   6257篇
矿业工程   2682篇
能源动力   2355篇
轻工业   5511篇
水利工程   1824篇
石油天然气   3520篇
武器工业   925篇
无线电   9870篇
一般工业技术   7675篇
冶金工业   2755篇
原子能技术   1117篇
自动化技术   11842篇
  2025年   29篇
  2024年   1546篇
  2023年   1746篇
  2022年   3060篇
  2021年   4258篇
  2020年   3313篇
  2019年   2545篇
  2018年   2588篇
  2017年   2888篇
  2016年   2584篇
  2015年   3839篇
  2014年   4759篇
  2013年   5431篇
  2012年   6397篇
  2011年   6582篇
  2010年   5864篇
  2009年   5408篇
  2008年   5107篇
  2007年   4529篇
  2006年   3854篇
  2005年   3084篇
  2004年   2014篇
  2003年   1323篇
  2002年   1188篇
  2001年   905篇
  2000年   766篇
  1999年   686篇
  1998年   424篇
  1997年   374篇
  1996年   327篇
  1995年   274篇
  1994年   217篇
  1993年   147篇
  1992年   105篇
  1991年   99篇
  1990年   63篇
  1989年   50篇
  1988年   48篇
  1987年   30篇
  1986年   23篇
  1985年   11篇
  1984年   12篇
  1983年   4篇
  1982年   12篇
  1981年   11篇
  1980年   21篇
  1979年   16篇
  1976年   2篇
  1959年   14篇
  1951年   10篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
近年来,高校的计算机基础教学在不断发展,教学方法也在不断地改进。如何根据学生特点,使用各种行之有效的教学方法是提高教学质量的关键。文章结合教学实际,分析探讨了如何针对艺术类专业学生的特点,进行《计算机基础》教学方法改革。  相似文献   
52.
Semi-supervised dimensional reduction methods play an important role in pattern recognition, which are likely to be more suitable for plant leaf and palmprint classification, since labeling plant leaf and palmprint often requires expensive human labor, whereas unlabeled plant leaf and palmprint is far easier to obtain at very low cost. In this paper, we attempt to utilize the unlabeled data to aid plant leaf and palmprint classification task with the limited number of the labeled plant leaf or palmprint data, and propose a semi-supervised locally discriminant projection (SSLDP) algorithm for plant leaf and palmprint classification. By making use of both labeled and unlabeled data in learning a transformation for dimensionality reduction, the proposed method can overcome the small-sample-size (SSS) problem under the situation where labeled data are scant. In SSLDP, the labeled data points, combined with the unlabeled data ones, are used to construct the within-class and between-class weight matrices incorporating the neighborhood information of the data set. The experiments on plant leaf and palmprint databases demonstrate that SSLDP is effective and feasible for plant leaf and palmprint classification.  相似文献   
53.
为了使传统的关联规则挖掘算法在结合到具体领域时具有更强的适应性,提出了DS-Apriori算法。该算法建立在语义本体的基础上,根据项集内部的语义相关度动态的确定该项集的最小支持度,并采用了项集语义相关度的增量计算方法。实验结果表明,DS-Apriori算法在很大程度上提高了关联规则挖掘算法的效率和效果。  相似文献   
54.
动态相位调整技术在FPGA中的设计与实现   总被引:1,自引:0,他引:1  
提出一种基于FPGA的动态相位调整实现方案。在高速数据传输接口中,由于数据窗缩小以及传输路径不一致,造成数据和时钟信号在FPGA的接收端发生位偏移和字偏移。动态相位调整技术根据当前各数据线物理状态,对各信号线动态进行去偏移操作,克服了静态相位调整中参数不可再调的缺点,使接口不断适应外部环境的变化,从而保证数据的可靠传输。  相似文献   
55.
Understanding the TCP congestion control mechanism from a global optimization point of view is not only important in its own right, but also crucial to the design of other transport layer traffic control protocols with provable properties. In this paper, we derive a global utility function and the corresponding optimal control law, known as TCP control law, which maximizes the global utility. The TCP control law captures the essential behaviors of TCP, including slow start, congestion avoidance, and the binary nature of congestion feedback in TCP. We find that the utility function of TCP is linear in the slow start phase and is proportional to the additive increase rate and approaches the well-known logarithm function as the data rate becomes large in the congestion avoidance phase. We also find that understanding the slow start phase with a fixed threshold is critical to the design of new transport layer control protocols to enable quality of service features. Finally, as an application, we design a Minimum Rate Guaranteed (MRG) traffic control law that shares the same utility function as the TCP control law. Our simulation study of the MRG control law indicates that it is indeed TCP friendly and can provide minimum rate guarantee as long as the percentage of network resource consumed by the MRG flows is moderately small.  相似文献   
56.
Aggregate signatures are useful in special areas where the signatures on many different messages generated by many different users need to be compressed. In this paper, we study aggregate signatures in certificateless public key settings. We first present the notion and security model of certificateless aggregate signature schemes. Then we give an efficient certificateless aggregate signature scheme. Our scheme is existentially unforgeable under adaptive chosen-message attacks assuming the computational Diffie–Hellman problem is hard.  相似文献   
57.
The measurement of plant community structure provides an extensive understanding of its function, succession and ecological process. The detection of plant community boundary is rather a challenge despite in situ work. Recent advances in object-based image analysis (OBIA) and machine learning algorithms offer new opportunities to address this challenge. This study presents a multi-scale segmentation approach to accurately identify the boundaries of each vegetation and plant community for mapping plant community structure. Initially, a very high resolution (VHR) Worldview-2 image of a desert area is hierarchically segmented from scale parameter 2 to 500. Afterward, the peak values of the standard deviation of brightness and normalized difference vegetation index (NDVI) across the segmentation scales are detected to determine the optimal segmentation scales of homogeneous single plant and plant community boundaries. A multi-scale classification of vegetation characterization with features of multiple bands, NDVI, grey-level co-occurrence matrix (GLCM) entropy and shape index is performed to identify dryland vegetation types. Finally, the four vegetation structural features on the type, diversity, object size and shape are calculated within the plant community boundaries and composed to plant community structure categories. Comparing the results with the object fitting index (FI) of the reference data, the validation indicates that the optimal segmentations of tree, shrub and plant communities are consistent with the identified peak values.  相似文献   
58.
Large holes are unavoidably generated in depth image based rendering (DIBR) using a single color image and its associated depth map. Such holes are mainly caused by disocclusion, which occurs around the sharp depth discontinuities in the depth map. We propose a divide-and-conquer hole-filling method which refines the background depth pixels around the sharp depth discontinuities to address the disocclusion problem. Firstly, the disocclusion region is detected according to the degree of depth discontinuity, and the target area is marked as a binary mask. Then, the depth pixels located in the target area are modified by a linear interpolation process, whose pixel values decrease from the foreground depth value to the background depth value. Finally, in order to remove the isolated depth pixels, median filtering is adopted to refine the depth map. In these ways, disocclusion regions in the synthesized view are divided into several small holes after DIBR, and are easily filled by image inpainting. Experimental results demonstrate that the proposed method can effectively improve the quality of the synthesized view subjectively and objectively.  相似文献   
59.
Deng  Juan  Zhao  Shu  Wang  Yan  Wang  Lei  Wang  Hong  Sha  Hong 《Multimedia Tools and Applications》2017,76(7):10097-10117
Multimedia Tools and Applications - Most of the existing image encryption algorithms based on compressive sensing are too complex to operate. An image compression-encryption scheme with simple...  相似文献   
60.
E-commerce present opportunities and challenges for businesses, especially for micro-enterprises. This paper proposed a theoretical framework that in line with the unique characteristics of E-commerce acceptance in micro-enterprises in Chengdu, which is based on the unified theory of acceptance and use of technology (UTAUT) model. The extending UTAUT model includes key constructs of performance expectation, perceived behavioral control and the characteristics of owner-managers.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号